Threat IntelHIGH

Threat Intel - Aqua Security’s Trivy Scanner Compromised

CSCyber Security News
Aqua SecurityTrivysupply chain attackmalicious releasescredential theft
🎯

Basically, hackers took control of a popular security tool to steal sensitive information from users.

Quick Summary

Aqua Security's Trivy scanner was compromised in a supply chain attack, leading to credential theft. This incident affects many users relying on the tool, highlighting significant security risks. Immediate action is required to secure environments and prevent further exploitation.

The Threat

In a significant supply chain attack, Aqua Security's widely used open-source vulnerability scanner, Trivy, was compromised. Attackers exploited compromised credentials to distribute malicious releases, turning a trusted security tool into a means for large-scale credential theft. This incident began in late February 2026 when a misconfiguration in Trivy's GitHub Actions environment allowed attackers to extract a privileged access token.

Despite Aqua Security's efforts to disclose the incident and rotate credentials on March 1, the remediation was incomplete. This oversight enabled the attackers to maintain access through still-valid credentials. On March 19, they escalated their attack by force-pushing malicious commits to numerous version tags in the aquasecurity/trivy-action repository, effectively injecting malicious code into existing workflows without detection.

Who's Behind It

The threat actor behind this attack has not been publicly identified, but their tactics indicate a sophisticated understanding of CI/CD environments. By leveraging compromised service accounts, they triggered automated release pipelines to publish a backdoored version of Trivy, designated as version 0.69.4. This version was designed to execute malicious payloads before legitimate scanning logic, allowing it to collect sensitive information from CI/CD environments without raising alarms.

The attack primarily targeted organizations using mutable version tags instead of pinned commit hashes, making it easier for the attackers to inject malicious code into workflows that were already in use. As a result, the attack affected numerous users relying on Trivy for vulnerability scanning.

Tactics & Techniques

The attackers employed several tactics to achieve their goals:

  • Exploiting Misconfigurations: They took advantage of a misconfigured GitHub Actions environment to gain initial access.
  • Malicious Code Injection: By force-pushing changes to version tags, they silently injected malware into existing workflows.
  • Data Exfiltration: The malware collected sensitive information, including API tokens and cloud provider credentials, and exfiltrated this data to attacker-controlled infrastructure.

As the investigation continues, Aqua Security has collaborated with global incident response firm Sygnia to address the ongoing threat. Remediation efforts include removing malicious releases from distribution channels and conducting comprehensive credential revocations across all environments.

Defensive Measures

Organizations using Trivy are urged to take immediate action to secure their environments. Key recommendations include:

  • Audit Environments: Review your systems for the compromised version of Trivy (v0.69.4) and update to known-safe releases (v0.69.2-v0.69.3).
  • Rotate Secrets: Treat all secrets accessible to affected environments as exposed and execute immediate rotation.
  • Monitor for Indicators: Proactively hunt for network and host-based indicators of compromise within your firewalls and SIEMs.

Aqua Security has acknowledged the critical role of the broader security community in addressing this incident. Collaboration with research teams has been essential in notifying downstream users and mitigating the fallout from this attack. As the situation evolves, organizations must remain vigilant and adapt their security practices to prevent similar incidents in the future.

🔒 Pro insight: This incident underscores the importance of immutable release practices in open-source projects to mitigate supply chain vulnerabilities.

Original article from

Cyber Security News · Guru Baran

Read Full Article

Related Pings

HIGHThreat Intel

Trivy Supply Chain Compromise - Detection and Defense Guide

A recent supply chain attack compromised Trivy, injecting malware into CI/CD pipelines. Organizations using this tool are at risk of credential theft. Learn how to detect and defend against such threats effectively.

Microsoft Security Blog·
HIGHThreat Intel

LiteLLM Compromised - TeamPCP Supply Chain Attack Exposed

The LiteLLM package on PyPI was compromised by TeamPCP, affecting hundreds of thousands of devices. This attack exploited supply chain vulnerabilities, leading to significant data theft. Organizations must act quickly to secure their systems and rotate exposed credentials.

BleepingComputer·
HIGHThreat Intel

Threat Intel - Checkmarx KICS Targeted in Supply Chain Attack

TeamPCP is targeting Checkmarx's KICS and other essential tools. This raises alarms about potential wider impacts on the software supply chain. Vigilance is crucial.

Dark Reading·
HIGHThreat Intel

AI Threat Curve Reset - Phishing Attacks Are Dangerous Again

AI has reset the threat curve, making phishing attacks more dangerous. Security leaders must adapt to these hyper-personalized threats to protect their organizations. New strategies are essential to defend against this evolving landscape.

SC Media·
HIGHThreat Intel

Threat Intel - Managing Cyber Risk Amid Rising Attacks

Financially motivated cyber attacks are escalating, prompting a need for businesses to enhance their security measures. Experts highlight the evolving ransomware landscape and the importance of real-time threat intelligence. Staying informed is crucial for effective defense against these threats.

SC Media·
MEDIUMThreat Intel

Threat Intel - Companies Face Tough Choices Blaming Hackers

After a cyberattack, companies face tough choices about naming hackers. This decision impacts everything from retaliation risks to insurance claims. It's a complex landscape that requires careful navigation.

Cybersecurity Dive·